Sphynx offers customised services for enterprise security assurance. These enable our clients to set up security assessments, based on industrial and international standards (e.g., cloud, network, smart metering standards). The assessments are based and leverage on outcomes of the built-in analytic capabilities of the Sphynx’s security and privacy assurance platforms as well as external tools, including threat analysis, vulnerability and penetration testing, continuous monitoring at all levels of the enterprise system implementation stack, sophisticated event processing and anomaly pattern detection.
The Sphynx Security Assurance service has a form of an extended detection and response (XDR) service utilising the automations that the S&P assurance platform offers in collecting, correlating, and analysing data for threats, vulnerabilities, and incidents; estimating technical and economic impact and risks; and generating suggestions for responses, covering:
- Baseline assessments
- Comprehensive modelling and dependencies of enterprise assets (i.e., computational infrastructure, software, data assets, business processes, physical assets, people);
- Threat analysis, Vulnerability analysis, Penetration testing;
- Detection of basic security and privacy (e.g., General Data Protection Regulation – GDPR) risks to enterprise assets;
- Potential technical and economic impact of risks;
- Assessment of enterprise security and privacy policies.
- Continuous risk assessments (RA)
- Continuous risk assessments (via event logging mechanisms, anonymisation filters, and security controls deployment) based on indicators established by international standards and/or custom indicators;
- Continuous monitoring of user and entity behaviour and analytics (UEBA);
- Continuous threat, vulnerability and risk assessments based on hybrid analysis;
- Continuous analysis of technical and economic impact of risks;
- Continuous cyber threat intelligence.
- Continuous cyber threat intelligence (CTI)
- MISP and STIX cyber threat intelligence ingestion;
- Refinement of threat, vulnerability and risk analysis based on ingested CTI indicators using hybrid analysis;
- Automated and/or semi-automated updates of monitoring indicators based on ingested CTI data.
- Data protection officer (DPO) service
- Overseeing of compliance with GDPR based on different types of threat, vulnerability, and risk analysis;
- Initiation, guidance, and monitoring of implementation of GDPR related incidents response;
- Receipt, handling, and auditing of GDPR requests from internal and external stakeholders;
- Legal and technical representation of the enterprise to external stakeholders for all GDPR issues.